feat: better messaging

This commit is contained in:
Nik L
2026-04-02 15:36:34 -04:00
parent 3fd6d63fa3
commit 8ec166590d
6 changed files with 27 additions and 26 deletions

View File

@@ -1,12 +1,12 @@
# Greywall
> Frictionless, default-deny sandboxing with real-time observability for AI agents on Linux and macOS.
> Frictionless sandboxing with real-time observability for AI agents on Linux and macOS.
Greywall is an open-source CLI tool that wraps any AI agent (Claude Code, Codex, Cursor, Aider, and others) in a kernel-enforced sandbox. It uses five security layers on Linux (Bubblewrap namespaces, Landlock filesystem, Seccomp BPF syscall filtering, eBPF monitoring, and TUN+SOCKS5 network proxy) and four on macOS (Seatbelt sandbox, filesystem policy, log stream monitor, and proxy-based network control). Default-deny policy means nothing is accessible unless explicitly granted. Built by Greyhaven, licensed Apache 2.0.
Greywall is an open-source CLI tool that wraps any AI agent (Claude Code, Codex, Cursor, Aider, and others) in a kernel-enforced sandbox. It uses five security layers on Linux (Bubblewrap namespaces, Landlock filesystem, Seccomp BPF syscall filtering, eBPF monitoring, and TUN+SOCKS5 network proxy) and four on macOS (Seatbelt sandbox, filesystem policy, log stream monitor, and proxy-based network control). Built by Greyhaven, licensed Apache 2.0.
## Key Features
- Filesystem isolation (kernel-enforced read/write/deny per path)
- Network isolation (all traffic routed through GreyProxy)
- Network isolation (all traffic routed through Greywall's proxy)
- Command blocking (detects blocked commands in pipes, chains, nested shells)
- Real-time violation monitoring (every denial captured with full context)
- Learning mode (auto-generates least-privilege templates from observed access)